Computers & Security

Papers
(The median citation count of Computers & Security is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic285
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey228
Image-Based malware classification using ensemble of CNN architectures (IMCEC)209
A deep learning method with wrapper based feature extraction for wireless intrusion detection system188
Building Auto-Encoder Intrusion Detection System based on random forest feature selection186
Cybersecurity for autonomous vehicles: Review of attacks and defense170
IoT malicious traffic identification using wrapper-based feature selection mechanisms165
An effective intrusion detection approach using SVM with naïve Bayes feature embedding148
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism104
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence99
Resource allocation and trust computing for blockchain-enabled edge computing system96
Privacy preservation in federated learning: An insightful survey from the GDPR perspective95
Byte-level malware classification based on markov images and deep learning93
A systematic literature review of methods and datasets for anomaly-based network intrusion detection89
Deep learning for insider threat detection: Review, challenges and opportunities87
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM85
A blockchain-based scheme for privacy-preserving and secure sharing of medical data83
The internet of things security: A survey encompassing unexplored areas and new insights82
GDroid: Android malware detection and classification with graph convolutional network79
Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges78
Defining organisational information security culture—Perspectives from academia and industry78
A survey on methods and challenges in EEG based authentication74
A survey on wireless body area networks: architecture, security challenges and research opportunities74
A zero-knowledge-proof-based digital identity management scheme in blockchain73
Riskio: A Serious Game for Cyber Security Awareness and Education72
AMalNet: A deep learning framework based on graph convolutional networks for malware detection71
APT datasets and attack modeling for automated detection methods: A review69
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities69
Enhancing employees information security awareness in private and public organisations: A systematic literature review68
STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment67
HYDRA: A multimodal deep learning framework for malware classification67
Developing cybersecurity culture to influence employee behavior: A practice perspective66
Ransomware: Recent advances, analysis, challenges and future research directions66
A novel combinatorial optimization based feature selection method for network intrusion detection66
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning66
Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust65
An effective genetic algorithm-based feature selection method for intrusion detection systems64
A one-class classification approach for bot detection on Twitter64
EfficientNet convolutional neural networks-based Android malware detection62
A survey on security attacks and defense techniques for connected and autonomous vehicles61
Privacy Preserving Face Recognition Utilizing Differential Privacy61
The Ransomware-as-a-Service economy within the darknet60
Highly efficient federated learning with strong privacy preservation in cloud computing60
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems60
A novel architecture for web-based attack detection using convolutional neural network59
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data58
Intrusion detection methods based on integrated deep learning model58
Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision56
Anomaly detection in Industrial Control Systems using Logical Analysis of Data56
JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters56
System log clustering approaches for cyber security applications: A survey54
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things53
Proof of X-repute blockchain consensus protocol for IoT systems52
How can organizations develop situation awareness for incident response: A case study of management practice52
Developing a cyber security culture: Current practices and future needs52
A survey of machine learning techniques in adversarial image forensics51
Applying machine learning and natural language processing to detect phishing email51
Recurrent neural network for detecting malware51
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts50
Towards an interpretable deep learning model for mobile malware detection and family identification50
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions50
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks48
Susceptibility to phishing on social network sites: A personality information processing model48
A secure and scalable data integrity auditing scheme based on hyperledger fabric46
A comprehensive model of information security factors for decision-makers46
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks45
Characterizing cryptocurrency exchange scams45
A novel approach for detecting vulnerable IoT devices connected behind a home NAT43
Assessing IoT enabled cyber-physical attack paths against critical systems43
Multiclass malware classification via first- and second-order texture statistics43
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study42
On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild42
Malware detection employed by visualization and deep neural network42
A trusted feature aggregator federated learning for distributed malicious attack detection41
EaSTFLy: Efficient and secure ternary federated learning41
RNNIDS: Enhancing network intrusion detection systems through deep learning41
CAN-ADF: The controller area network attack detection framework41
A semantic-based classification approach for an enhanced spam detection40
Optimized extreme learning machine for detecting DDoS attacks in cloud computing40
Machine Learning Cyberattack and Defense Strategies40
Cybercrime threat intelligence: A systematic multi-vocal literature review39
Cloud computing security: A survey of service-based models39
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition39
Information security governance challenges and critical success factors: Systematic review38
UMUDGA: A dataset for profiling DGA-based botnet37
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives37
On the use of artificial malicious patterns for android malware detection37
A survey of machine learning-based solutions to protect privacy in the Internet of Things36
A comprehensive study of DDoS attacks over IoT network and their countermeasures36
Model-based risk assessment for cyber physical systems security36
Automating post-exploitation with deep reinforcement learning36
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization36
A novel framework for image-based malware detection with a deep neural network35
Continuous authentication by free-text keystroke based on CNN and RNN35
Cyber security risk assessment for seaports: A case study of a container port35
Three decades of deception techniques in active cyber defense - Retrospect and outlook35
Misinformation warnings: Twitter’s soft moderation effects on COVID-19 vaccine belief echoes34
A systematic threat analysis and defense strategies for the metaverse and extended reality systems34
Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection34
A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished34
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks34
A novel model for anomaly detection in network traffic based on kernel support vector machine34
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets34
A novel malware classification and augmentation model based on convolutional neural network33
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks33
Comparative research on network intrusion detection methods based on machine learning33
Obfuscated Malware Detection Using Deep Generative Model based on Global/Local Features33
Review of cybersecurity assessment methods: Applicability perspective33
Intrusion detection systems for RPL security: A comparative analysis33
Cybersecurity knowledge and skills taught in capture the flag challenges33
A principlist framework for cybersecurity ethics33
An efficient network behavior anomaly detection using a hybrid DBN-LSTM network32
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning32
An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices32
Securing smart healthcare system with edge computing32
A survey on multi-factor authentication for online banking in the wild32
Deep learning based cross architecture internet of things malware detection and classification32
Holistic cyber hygiene education: Accounting for the human factors32
A novel deep framework for dynamic malware detection based on API sequence intrinsic features31
Low-rate DDoS attacks detection method using data compression and behavior divergence measurement31
Threat detection and investigation with system-level provenance graphs: A survey31
A Multi-Perspective malware detection approach through behavioral fusion of API call sequence31
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects31
AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain30
Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.030
A Survey Of differential privacy-based techniques and their applicability to location-Based services29
Security in microservice-based systems: A Multivocal literature review29
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification29
CNN based method for the development of cyber-attacks detection algorithms in industrial control systems29
Attacks on the Industrial Internet of Things – Development of a multi-layer Taxonomy29
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity29
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment28
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views28
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches28
Empirical analysis of transaction malleability within blockchain-based e-Voting28
Privacy-preserving and communication-efficient federated learning in Internet of Things28
Datasets are not enough: Challenges in labeling network traffic28
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction28
A fair selection protocol for committee-based permissionless blockchains28
Digestive neural networks: A novel defense strategy against inference attacks in federated learning27
Detecting malicious JavaScript code based on semantic analysis27
Adopting automated whitelist approach for detecting phishing attacks27
Robust deep learning early alarm prediction model based on the behavioural smell for android malware27
An in-depth review of machine learning based Android malware detection27
A comprehensive deep learning benchmark for IoT IDS27
Cyber-threat perception and risk management in the Swedish financial sector27
Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique27
SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues26
Survey on smart homes: Vulnerabilities, risks, and countermeasures26
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)26
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function26
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems26
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses26
Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment26
A privacy preserve big data analysis system for wearable wireless sensor network26
The cybersecurity workforce and skills26
A framework for effective corporate communication after cyber security incidents26
Intelligent cyber-phishing detection for online26
Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage25
Towards asynchronous federated learning based threat detection: A DC-Adam approach25
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks25
A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid25
A graph-theoretic approach for the detection of phishing webpages25
Multi attribute auction based incentivized solution against DDoS attacks25
A blockchain-based certificate revocation management and status verification system25
Android malware detection via an app similarity graph25
Privacy-preserving Naive Bayes classification in semi-fully distributed data model24
A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis24
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art24
A systematic review of cyber-resilience assessment frameworks24
Building cyber security awareness in a developing country: Lessons from Myanmar24
Continuous auditing and threat detection in multi-cloud infrastructure23
A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management23
A Secure Mutual authentication approach to fog computing environment23
RansomSpector: An introspection-based approach to detect crypto ransomware23
Building next generation Cyber Ranges with CRACK23
UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices23
Random CapsNet forest model for imbalanced malware type classification task23
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders22
Machine learning based deep job exploration and secure transactions in virtual private cloud systems22
S3Feature: A static sensitive subgraph-based feature for android malware detection22
Exsense: Extract sensitive information from unstructured data22
Nudging personalized password policies by understanding users’ personality22
Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game22
Deep face fuzzy vault: Implementation and performance22
DNS covert channel detection method using the LSTM model22
k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers22
A systematic literature review on online assessment security: Current challenges and integrity strategies22
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks22
A comprehensive security assessment framework for software-defined networks22
Security defense decision method based on potential differential game for complex networks22
A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling22
Toward a stage theory of the development of employees’ information security behavior22
On Detecting and Classifying DGA Botnets and their Families22
DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification21
A tfidfvectorizer and singular value decomposition based host intrusion detection system framework for detecting anomalous system processes21
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection21
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security21
A Systematical and longitudinal study of evasive behaviors in windows malware21
FUZZOLIC: Mixing fuzzing and concolic execution21
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images21
Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem21
FogHA: An efficient handover authentication for mobile devices in fog computing21
Modeling effective cybersecurity training frameworks: A delphi method-based study21
Identifying malicious nodes in wireless sensor networks based on correlation detection21
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique21
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models21
Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise21
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant21
What’s really ‘Happning’? A forensic analysis of Android and iOS Happn dating apps21
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection21
Efficient handover protocol for 5G and beyond networks21
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks21
Cultivating cybersecurity learning: An integration of self-determination and flow20
Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets20
Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions20
AutoVAS: An automated vulnerability analysis system with a deep learning approach20
Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity20
Cyber security challenges in aviation communication, navigation, and surveillance20
Moving target defense in cloud computing: A systematic mapping study20
Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach20
Machine learning-based early detection of IoT botnets using network-edge traffic20
A hybrid method of entropy and SSAE-SVM based DDoS detection and mitigation mechanism in SDN20
An anomaly detection framework for cyber-security data20
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes20
SQL injection attack detection in network flow data20
A novel cryptosystem based on DNA cryptography and randomly generated mealy machine20
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels19
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences19
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation19
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives19
A Tokenless Cancellable Scheme for Multimodal Biometric Systems19
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions19
Traceability in supply chains: A Cyber security analysis19
Improving SIEM alert metadata aggregation with a novel kill-chain based classification model19
An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment19
A tree structure-based improved blockchain framework for a secure online bidding system19
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT19
The role of national cybersecurity strategies on the improvement of cybersecurity education19
Serious games as a tool to model attack and defense scenarios for cyber-security exercises19
Integrating elaboration likelihood model and herd theory in information security message persuasiveness18
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense18
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data18
Compliance with bring your own device security policies in organizations: A systematic literature review18
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis18
Optimizing symbolic execution for malware behavior classification18
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems18
Duplicitous social media and data surveillance: An evaluation of privacy risk18
GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System18
Security and privacy of the Internet of Things18
0.035996198654175